arno-iptables-firewall 2.0.3-3 source package in Ubuntu
Changelog
arno-iptables-firewall (2.0.3-3) unstable; urgency=medium [ Samuel Henrique ] * Add d/salsa-ci.yml [ Sven Geuer ] * Fix potential systemd service file shutdown problem - Introduce d/patches/systemd-service-file-shutdown-problems * Fix typo in manpage - Introduce d/patches/arno-fwfilter_manpage_fix * Fix introducing text of 00debconf.conf - Update d/postinst - Update d/tests/test1_00debconf.conf * Alter autopkgtest Restrictions from isolation-machine to isolation-container - Update d/tests/control * Update URLs of rocky.eld.leidenuniv.nl to https in d/* * Switch to DH compat format - Replace Build-Depends debhelper by debhelper-compat in d/control - Remove file d/compat * d/control: - Bump Standards-Version to 4.4.1 - Add Rules-Requires-Root field * d/copyright - Add various authors missing for d/* - Group files and authors by license * d/test/* - rework test script and add workaround to run autopkgtest successfully on salsa.d.o. -- Sven Geuer <email address hidden> Sat, 23 Nov 2019 13:44:14 +0100
Upload details
- Uploaded by:
- Debian Security Tools
- Uploaded to:
- Sid
- Original maintainer:
- Debian Security Tools
- Architectures:
- all
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
arno-iptables-firewall_2.0.3-3.dsc | 2.1 KiB | 4cb16f5e0556717df80c1d4be76abfa7a66413a240451fe8b61cc26dd948ede2 |
arno-iptables-firewall_2.0.3.orig.tar.gz | 136.2 KiB | e2c4fb88a25f0cae8308a3b2bb922b5e2f52f24d8309b24e15a527a6b326e703 |
arno-iptables-firewall_2.0.3-3.debian.tar.xz | 56.1 KiB | 4e5be977d2429fc862b71bb51b5d84b9c9f10c2ad7c93b836a5908c2075d8dad |
No changes file available.
Binary packages built by this source
- arno-iptables-firewall: single- and multi-homed firewall script with DSL/ADSL support
Unlike other lean iptables frontends in Debian, arno-iptables-
firewall
will setup and load a secure, restrictive firewall by just asking a few
questions. This includes configuring internal networks for internet access
via NAT and potential network services (e.g. http or ssh).
.
However, it is in no way restricted to this simple setup. Some catch words
of additional features, that can be enabled in the well documented
configuration file are: DSL/ADSL, Port forwarding, DMZ's,
portscan detection, MAC address filtering.
.
Moreover, it comes with an extensive set of plugins to cover further
requirements. For example ssh brute force protection, traffic shaping,
traffic accounting, vpn support to just mention a few.